<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The wireless router can in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012839#M147637</link>
    <description>&lt;P&gt;The wireless router can usually only hand out ip addresses to devices connected to it (i.e, the ASA). For devices behind the ASA, you need the ASA or another internal DHCP server that responds back to DHCP discover requests. This requires the device to be in the same broadcast domain.&lt;/P&gt;
&lt;P&gt;Alternatively, you can forward DHCP request received on the ASA inside interface to the Wireless router using DHCP relay functionality. You would have to make sure that the DHCP pool is 10.1.7.0. Steps on configuring DHCP relay can be sen below:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116265-configure-product-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Jan 2017 15:31:57 GMT</pubDate>
    <dc:creator>Rahul Govindan</dc:creator>
    <dc:date>2017-01-18T15:31:57Z</dc:date>
    <item>
      <title>ASA 5510 inside hosts cannot connect</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012836#M147634</link>
      <description>&lt;P&gt;I have an ASA 5510 behind a Comcast wireless router. &amp;nbsp;I have set the inside/outside interfaces and the ASA can ping public IPs.&lt;/P&gt;
&lt;P&gt;However,&amp;nbsp;hosts connected to the inside interfaces do not receive any network info. &amp;nbsp;On Windows 7 it just shows Unidentified Network with a 169 IP. &amp;nbsp;Here is the config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;: &lt;BR /&gt;: Serial Number: JMX1545X1MX&lt;BR /&gt;: Hardware: ASA5510, 1024 MB RAM, CPU Pentium 4 Celeron 1600 MHz&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.1(7)12 &lt;BR /&gt;!&lt;BR /&gt;hostname asa02&lt;BR /&gt;enable password 4Y6ASR0TCCECSH9N encrypted&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 96.80.155.123 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.1.7.4 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; management-only&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.2.1.15 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa917-12-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;access-list outside_access_in extended permit icmp any any4 &lt;BR /&gt;access-list outside_access_in extended deny ip any any4 &lt;BR /&gt;access-list inside_access_in extended permit ip 10.1.7.0 255.255.255.0 any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;asdm image disk0:/asdm-762-150.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 96.80.155.126 1 &lt;BR /&gt;route management 10.1.6.0 255.255.255.0 10.2.1.1 1 &lt;BR /&gt;route inside 10.1.7.0 255.255.255.0 10.1.10.1 1 &lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;http 10.1.6.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 10.1.6.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username xuser1 password xM1bBQxnDa5n/peu encrypted&lt;BR /&gt;username xuser2&amp;nbsp;password Hk6boxoanQfAYCe0 encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt; message-length maximum client auto&lt;BR /&gt; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt; inspect dns preset_dns_map &lt;BR /&gt; inspect ftp &lt;BR /&gt; inspect h323 h225 &lt;BR /&gt; inspect h323 ras &lt;BR /&gt; inspect rsh &lt;BR /&gt; inspect rtsp &lt;BR /&gt; inspect esmtp &lt;BR /&gt; inspect sqlnet &lt;BR /&gt; inspect skinny &lt;BR /&gt; inspect sunrpc &lt;BR /&gt; inspect xdmcp &lt;BR /&gt; inspect netbios &lt;BR /&gt; inspect tftp &lt;BR /&gt; inspect ip-options &lt;BR /&gt; inspect icmp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:864b9f92cb29fda1123161d7da3e5487&lt;BR /&gt;: end&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can anyone help?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:47:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012836#M147634</guid>
      <dc:creator>AllianceITSupport</dc:creator>
      <dc:date>2019-03-12T08:47:37Z</dc:date>
    </item>
    <item>
      <title>Where are your hosts supposed</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012837#M147635</link>
      <description>&lt;P&gt;Where are your hosts supposed to get to get their ip addresses from? Do you have a DHCP server on the inside network? I do not see a DHCP server config on the ASA, so the ASA is not configured to hand out ip addresses. Example of configuring DHCP server on the ASA is given here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa90/configuration/guide/asa_90_cli_config/basic_dhcp.html#pgfId-1251531&lt;/P&gt;
&lt;P&gt;Second, your ASA is not configured to NAT the traffic going to the internet. Configure this if you want them to be able to talk to hosts on the internet. An example is here:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/111842-asa-dynamic-pat-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 01:12:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012837#M147635</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-18T01:12:25Z</dc:date>
    </item>
    <item>
      <title>The wireless router is</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012838#M147636</link>
      <description>&lt;P&gt;The wireless router is responsible for DHCP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've added a PAT rule for inside to outside, but it doesn't seem to help. &amp;nbsp;Hosts connected to the firewall don't receive network info from the wireless router.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 15:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012838#M147636</guid>
      <dc:creator>AllianceITSupport</dc:creator>
      <dc:date>2017-01-18T15:02:48Z</dc:date>
    </item>
    <item>
      <title>The wireless router can</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012839#M147637</link>
      <description>&lt;P&gt;The wireless router can usually only hand out ip addresses to devices connected to it (i.e, the ASA). For devices behind the ASA, you need the ASA or another internal DHCP server that responds back to DHCP discover requests. This requires the device to be in the same broadcast domain.&lt;/P&gt;
&lt;P&gt;Alternatively, you can forward DHCP request received on the ASA inside interface to the Wireless router using DHCP relay functionality. You would have to make sure that the DHCP pool is 10.1.7.0. Steps on configuring DHCP relay can be sen below:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116265-configure-product-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 15:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012839#M147637</guid>
      <dc:creator>Rahul Govindan</dc:creator>
      <dc:date>2017-01-18T15:31:57Z</dc:date>
    </item>
    <item>
      <title>You're right, I set up the</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012840#M147638</link>
      <description>&lt;P&gt;You're right, I set up the ASA to forward DHCP and it's working now. &amp;nbsp;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jan 2017 15:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-inside-hosts-cannot-connect/m-p/3012840#M147638</guid>
      <dc:creator>AllianceITSupport</dc:creator>
      <dc:date>2017-01-18T15:44:09Z</dc:date>
    </item>
  </channel>
</rss>

